| Publication | Date of Publication | Type |
|---|
| Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves | 2024-11-13 | Paper |
| Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH} | 2024-10-14 | Paper |
| Compact FE for unbounded attribute-weighted sums for logspace from SXDH | 2023-08-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5052941 | 2022-11-25 | Paper |
| Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems | 2022-10-14 | Paper |
| Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence | 2022-10-07 | Paper |
| An efficient authenticated key exchange from random self-reducibility on CSIDH | 2022-03-24 | Paper |
| Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves | 2021-08-16 | Paper |
| Improved supersingularity testing of elliptic curves | 2021-07-05 | Paper |
| Counting Richelot isogenies between superspecial abelian surfaces | 2021-03-11 | Paper |
| Post-Quantum Constant-Round Group Key Exchange from Static Assumptions | 2021-02-25 | Paper |
| Unbounded inner product functional encryption from bilinear maps | 2021-02-15 | Paper |
| Efficient attribute-based signatures for unbounded arithmetic branching programs | 2020-01-28 | Paper |
| One-round authenticated group key exchange from isogenies | 2020-01-10 | Paper |
| Fully secure functional encryption with a large class of relations from the decisional linear assumption | 2019-11-27 | Paper |
| Supersingular isogeny Diffie-Hellman authenticated key exchange | 2019-03-29 | Paper |
| New assumptions on isogenous pairing groups with applications to attribute-based encryption | 2019-03-29 | Paper |
| Constructing an efficient hash function from $3$-isogenies | 2019-03-18 | Paper |
| Heuristic counting of Kachisa-Schaefer-Scott curves | 2019-03-18 | Paper |
| Adaptively simulation-secure attribute-hiding predicate encryption | 2019-01-23 | Paper |
| Unbounded inner product functional encryption from bilinear maps | 2019-01-23 | Paper |
| New proof techniques for DLIN-based adaptively secure attribute-based encryption | 2017-08-25 | Paper |
| Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders | 2016-01-27 | Paper |
| Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption | 2015-10-26 | Paper |
| Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption | 2014-10-14 | Paper |
| Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting | 2014-02-18 | Paper |
| Decentralized Attribute-Based Signatures | 2013-04-19 | Paper |
| Fully Secure Unbounded Inner-Product and Attribute-Based Encryption | 2013-03-19 | Paper |
| Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption | 2012-07-20 | Paper |
| Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption | 2012-06-29 | Paper |
| Some Key Techniques on Pairing Vector Spaces | 2011-06-29 | Paper |
| Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model | 2011-03-15 | Paper |
| Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption | 2010-08-24 | Paper |
| Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption | 2010-06-01 | Paper |
| Hierarchical Predicate Encryption for Inner-Products | 2009-12-15 | Paper |
| AN ALGORITHM FOR COMPUTING A SEQUENCE OF RICHELOT ISOGENIES | 2009-08-06 | Paper |
| Homomorphic Encryption and Signatures from Vector Decomposition | 2009-02-10 | Paper |
| Efficiently Computable Distortion Maps for Supersingular Curves | 2008-05-27 | Paper |
| New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method | 2008-03-17 | Paper |